Executive advisory
Working with leaders, executive teams, and complex organizations on decisions where cybersecurity, resilience, control, identity, and regulation have real impact on governance, operations, and value.
Explore advisory →I work with large organizations, boards, and selective partners when cybersecurity, risk, regulation, and decision architecture require real operating experience, executive judgment, and execution capability.
Executive advisory, pilots, applied education, and strategic work in regulated and high-trust environments.
My work today concentrates on three fronts: executive advisory, pilots and applied simulation, and developing initiatives with structural potential in high-trust systems.
Working with leaders, executive teams, and complex organizations on decisions where cybersecurity, resilience, control, identity, and regulation have real impact on governance, operations, and value.
Explore advisory →Designing and facilitating concrete, useful entry formats: crisis simulations, executive workshops, readiness diagnostics, and clarity sprints for regulated or high-demand contexts.
View working formats →Working selectively with family offices, venture partners, strategic investors, and large organizations when an executive lens is needed to evaluate, shape, or activate opportunities in high-trust systems.
Capital & Partnerships →Credibility here does not rest on a single category. It is built on enterprise experience, institutional speaking, teaching, and sustained building.
Creator of ELENA crisis simulator. Invited speaker at Spain's national CERT — Jornadas STIC (2023, 2024).
Faculty in professional cybersecurity, data protection, and cybercrime programmes.
Senior cybersecurity and risk roles across banking (Santander), consulting (EY), and global security operations (Prosegur).
Cybersecurity and resilience platform. BrandGuard phishing intelligence. Registered as SmartKEA CyberInnovation SL.
Co-founded IntelCon (cyber intelligence conference) and GINSEG (professional intelligence community).
Not generic theory. Work on concrete decisions, capabilities, and strategic moves.
Supporting decisions on cyber governance, resilience, posture visibility, critical capabilities, identity, risk, and executive coordination.
Connecting identity, information systems, control, automation, and AI with executive clarity and operational utility.
Working with leadership and key teams to turn ransomware and disruption scenarios into useful preparation, shared language, and better response capability.
Providing judgment to shape initiatives, pilots, and opportunities where technology, regulatory pressure, buyer reality, and value design must align before scaling.
The differentiation is not talking about cybersecurity. It is having operated inside it, built outside it, and understanding how risk, adoption, regulation, architecture, executive decision-making, and value creation connect.
Senior roles in financial services cybersecurity (IAM, 2LoD cyber risk, posture visibility) and consulting (cyber intelligence advisory for regulated institutions). Experience where coordination, control, and visibility genuinely matter.
Threat intelligence operations, OSINT methodology, and decision-support systems. Co-founder of GINSEG and IntelCon — professional intelligence community and conference. Connecting signals, context, and operational pressure to better judgment.
University faculty at UNIR (cybersecurity, data protection, cybercrime). Programme coordination at ESCP Business School. Institutional collaborator at CCN-CERT (ELENA crisis simulator creator). Sustained work in applied education formats and institutional spaces.
Founder of SmartKEA CyberInnovation SL. Building cybersecurity, resilience, and intelligence platforms from operational experience in regulated environments. From advisory and pilots toward modular, repeatable capabilities with recurring value.
Through SmartKEA and selective strategic work, I am developing a more structured layer of capabilities oriented toward regulated organizations and high-trust environments. The direction is clear: from advisory and pilots with immediate utility toward more modular, repeatable capabilities with recurring value.
Capital & PartnershipsThe goal is not to add noise to the market. It is to build useful capabilities where regulation, risk, decision, and operations meet.
Credibility here does not rest on a single category. Built on enterprise experience, institutional speaking, teaching, and sustained building.
Experience in banking, consulting, and cyber operations in contexts where coordination, control, and visibility genuinely matter.
Participation in public and executive spaces where cybersecurity, resilience, simulation, intelligence, and applied training are addressed with practical focus.
Sustained work in collaboration with academic institutions and applied education formats.
Track record building initiatives and communities at the intersection of cybersecurity, intelligence, education, and systems.
When technical and regulatory complexity needs to be turned into executive decisions, useful capabilities, and better governance.
When cybersecurity, resilience, identity, crisis, or AI stop being operational topics and become coordination, risk, and decision topics.
When executive judgment is needed to understand high-trust systems, real risk, readiness, buyer logic, and collaboration or diligence possibilities.
When an opportunity needs contrast with enterprise reality, regulatory pressure, adoption capability, and partnership design.
Most useful conversations start through one of three paths:
For organizations that need judgment, clarity, and senior support on a critical decision, programme, or capability.
To validate a hypothesis, design a collaboration, prepare a simulation, or land a high-value initiative.
For selective conversations with family offices, strategic investors, venture partners, and large organizations where executive judgment adds value.
Explore the full record of talks, videos, media appearances, and institutional references.
Not generic theory. Observations from enterprise, advisory, education, and institutional work where cybersecurity, risk, and decision quality intersect.
Most cybersecurity ventures fail not because the technology is wrong, but because the thesis ignores enterprise friction, buyer readiness, and regulatory timing. What makes an opportunity worth serious attention and what should make you walk away.
Boards do not need more dashboards. They need a view of cyber risk they can act on. Posture visibility replaces guesswork with governance-grade judgment. Why this capability is becoming non-optional under DORA and NIS2.
In high-trust systems, the gap between what is presented and what is real determines whether a conversation becomes a partnership or a polite exit. Where executive judgment, technical due diligence, and regulatory awareness create clarity.
Share context, organization type, and conversation objective. Advisory, speaking, pilot, diligence, or partnership: a precise interaction is better than a generic one.